Sciweavers

2268 search results - page 137 / 454
» Modeling wireless shadow networks
Sort
View
MSWIM
2004
ACM
15 years 10 months ago
Experimental evaluation of wireless simulation assumptions
All analytical and simulation research on ad hoc wireless networks must necessarily model radio propagation using simplifying assumptions. Although it is tempting to assume that a...
David Kotz, Calvin C. Newport, Robert S. Gray, Jas...
NCA
2007
IEEE
15 years 11 months ago
On the Evaluation of Shortest Journeys in Dynamic Networks
The assessment of routing protocols for wireless networks is a difficult task, because of the networks’ highly dynamic behavior and the absence of benchmarks. However, some of ...
Afonso Ferreira, Alfredo Goldman, Julian Monteiro
CORR
2012
Springer
210views Education» more  CORR 2012»
14 years 19 days ago
Stability of the Max-Weight Protocol in Adversarial Wireless Networks
In this paper we consider the MAX-WEIGHT protocol for routing and scheduling in wireless networks under an adversarial model. This protocol has received a significant amount of a...
Sungsu Lim, Kyomin Jung, Matthew Andrews
TMC
2012
13 years 7 months ago
Protecting Location Privacy in Sensor Networks against a Global Eavesdropper
— While many protocols for sensor network security provide confidentiality for the content of messages, contextual information usually remains exposed. Such information can be c...
Kiran Mehta, Donggang Liu, Matthew Wright
LCN
2006
IEEE
15 years 11 months ago
Analysis of Exponential Backoff with Multipacket Reception in Wireless Networks
A collision resolution scheme is essential to the performance of a random-access wireless network. Most schemes employ exponential backoff (EB) to adjust the transmission attempt ...
Peng Xuan Zheng, Ying Jun Zhang, Soung Chang Liew